Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations bkrike on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Content Filtering without CVP Server

Status
Not open for further replies.

tekieVB

MIS
Apr 25, 2002
112
US
Secure Platform NG w/AI R55.

Has anyone implemented successfully a rule that blocks dangerous file downloads via http without using a CVP Server?

I have followed PhoneBoy's example in his book "Essential Check Point FW-1 NG" that uses URI Resources but what ends up happening it blocks access to legitimate websites that my endusers can not live without. I figure that somewhere in the path of the website they are trying to access must be the "key" extensions that I am attempting to block. Examples would be EXE or MSI file types.

I have to end up disabling the rule because it blocks my users from accessing websites that they can not live without.

Rule:

SRC Dest Service Action
Any Any http-->blocktypes drop (stops downloads of exe files)

Any Any http accept (allows normal web browsing)
 
Firewalls are not designed to be good content filtering devices. Best security practice calls for a proxy to be setup and one rule in your firewall rulebase to only allow outbound port 80 connections from the proxies IP. Most proxies let you integrate Anti-Virus also. Look at Blue Coat, or Finjan.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top